Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Board of Directors

Below you will find reports with the tag of “Board of Directors”

image from 2016 Security Pressures Report

2016 Security Pressures Report

A survey of 1,600 IT professionals on the risks being faced by organizations, the common reactions to those concerns, and the challenges with which individuals are struggling.

(more available)
Added: October 26, 2018
image from 2018 State Of Cyber Resilience

2018 State Of Cyber Resilience

Accenture research reveals the five steps that can help business leaders not only close the gap on cyber attackers, but also continue to transform and embed security into the fabric of their organizations within the next two to three years.

(more available)
Added: October 26, 2018
image from Data Privacy: How Boards Can Safeguard Digital Assets Today For Success Tomorrow

Data Privacy: How Boards Can Safeguard Digital Assets Today For Success Tomorrow

In this Cyber Security series, Amrop collaborates with some of the industry’s most innovative companies as they trailblaze through the digital landscape. This first insight piece is co-authored with Jason du Preez, CEO of Privitar, a leader in the development and adoption of privacy engineering technology.

(more available)
Added: October 26, 2018
image from Demystifying Vulnerabilitiy Management

Demystifying Vulnerabilitiy Management

This report takes a close look at vulnerability management and seeks to make it a far simpler task.

Added: October 26, 2018
image from 2017 Global Cybersecurity Assurance Report Card

2017 Global Cybersecurity Assurance Report Card

A survey-based report of over 700 individuals. The survey and resulting analysis was perfomed by CyberEdge.

Added: October 25, 2018
image from Cyber Value Connection

Cyber Value Connection

This report was created to present The Cyber-Value Connection, which is intended to put cyber security in a context that will resonate with business leaders. The Cyber-Value Connection looks at the reduction in company value that arises from a cyber breach, vividly demonstrating how a sever incident leads to a decline in share price.

(more available)
Added: October 25, 2018
image from Strengthening Digital Society Against Cyber Shocks

Strengthening Digital Society Against Cyber Shocks

This report is based on the key findings from The Global State of Information Security Survey.

Added: October 25, 2018
image from CIO Survey 2018: The Transformational CIO

CIO Survey 2018: The Transformational CIO

In last year’s survey, Harvey Nash and KPMG reported how CIOs were holding a steady line in the face of global uncertainty, cutting costs and refining business processes. Whilst much of this geopolitical instability remains, this year’s report shows how CIOs are benefiting from bigger budgets and headcount growth. Indeed, more IT leaders are enjoying budget increases than we have seen in the last thirteen years of reporting.

(more available)
Added: October 24, 2018
image from CISO Insights: 7 Best Practices For A Successful Insider Threat Program

CISO Insights: 7 Best Practices For A Successful Insider Threat Program

In this report, 15 CISOs identified some practical steps that may help remedy some of the challenges many of organizations experience when developing and implementing an insider threat program.

(more available)
Added: October 24, 2018
image from State Of CyberSecurity Implications For 2016

State Of CyberSecurity Implications For 2016

This paper is the presentation of data found through a survey administered in November and December of 2015.

Added: October 24, 2018
image from BDO 2017 Cyber Governance Survey

BDO 2017 Cyber Governance Survey

This survey was created to act as a barometer to measure the involvement of public company directors in cyber-risk management.

(more available)
Added: October 23, 2018
image from Beyond the Bottom Line: The Real Cost of Data Breaches

Beyond the Bottom Line: The Real Cost of Data Breaches

This report is based on the results of an independent survey conducted by market research specialist Vanson Bourne.

Added: October 23, 2018
image from Exploring Strategic Risk

Exploring Strategic Risk

This paper discusses the strategic risks facing coroporations today.

Added: October 23, 2018
image from The Digital Business: Creating The Right IT Platform For Digital Transformation

The Digital Business: Creating The Right IT Platform For Digital Transformation

The purpose of this paper is to help CIOs and their boardroom colleagues find the right approach to building a digital infrastructure to achieve the right outcomes for their business.

(more available)
Added: October 23, 2018
image from The Value Of Threat Intelligence: The Second Annual Study Of North American & United Kingdom Companies

The Value Of Threat Intelligence: The Second Annual Study Of North American & United Kingdom Companies

The purpose of this research is to examine trends in the benefits of threat intelligence and the challenges companies face when integrating threat intelligence with existing security platforms and technologies.

(more available)
Added: October 23, 2018
image from Understanding The Insider Threat And How To Mitigate It

Understanding The Insider Threat And How To Mitigate It

This paper is intended to give a high-level view on the insider threat for those looking to implement a defensive programme. It considers the types of attack that may take place and some of the common weaknesses that aid insider attacks. It also covers some of the policies and controls that can be implemented to detect, deter or defend against the insider threat. This paper is intended to be a summary, however, the final section details further reading and resources that provide more in-depth information.

(more available)
Added: October 23, 2018
image from 2015 Cost of Data Breach Study: United States

2015 Cost of Data Breach Study: United States

This year’s study examines the costs incurred by 62 U.S. companies in 16 industry sectors after those companies experienced the loss or theft of protected personal data and then had to notify breach victims as required by various laws. It is important to note the costs presented in this research are not hypothetical, but are from actual data loss incidents. They are based upon cost estimates provided by individuals, interviewed over a ten-month period in the companies that are represented in this research

(more available)
Added: October 22, 2018
image from Getting The Board On Board With Application Security

Getting The Board On Board With Application Security

It is the intention of this paper to provide you the reader with the essential tools and language that you can use to educate your board members on the importance and necessity of Application Security.

(more available)
Added: October 22, 2018
image from Incident Response Reference Guide

Incident Response Reference Guide

This Guide aims to help businesses have a good response to cyber threat incidents.

Added: October 22, 2018
image from NFP Governance And Performance Study

NFP Governance And Performance Study

This report analyzes non-profit organizations in Australia and in particular, sought to understand how important cybersecurity issues were to those organizations.

(more available)
Added: October 22, 2018
image from NIST Special Publication 800-171 for higher educatino

NIST Special Publication 800-171 for higher educatino

This is a guide that is especially designed to help colleges and universities comply with new federal regulations.

Added: October 22, 2018
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 13, 2025 04:08 UTC (build b1d7be4)